Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 724524 (CVE-2020-12693) - <sys-cluster/slurm-20.02.3.1: Authentication bypass via race condition (CVE-2020-12693)
Summary: <sys-cluster/slurm-20.02.3.1: Authentication bypass via race condition (CVE-2...
Status: RESOLVED FIXED
Alias: CVE-2020-12693
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://lists.schedmd.com/pipermail/s...
Whiteboard: ~1 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-05-22 03:55 UTC by Sam James
Modified: 2020-05-22 10:41 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-05-22 03:55:13 UTC
Description:
"Slurm 19.05.x before 19.05.7 and 20.02.x before 20.02.3, in the rare case where Message Aggregation is enabled, allows Authentication Bypass via an Alternate Path or Channel. A race condition allows a user to launch a process as an arbitrary user."
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-05-22 03:55:58 UTC
@maintainer(s), please bump to 20.02.3.
Comment 2 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2020-05-22 10:41:11 UTC
All done.